Behavioral task
behavioral1
Sample
10c72786e4bdb6194d2d0d9f2ca5f6d4_JaffaCakes118.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
10c72786e4bdb6194d2d0d9f2ca5f6d4_JaffaCakes118.xls
Resource
win10v2004-20240419-en
General
-
Target
10c72786e4bdb6194d2d0d9f2ca5f6d4_JaffaCakes118
-
Size
286KB
-
MD5
10c72786e4bdb6194d2d0d9f2ca5f6d4
-
SHA1
bf41ad6284dfe897addde7f50d3ebd5e8abca249
-
SHA256
a0991212440542342c5a0f717096a12cac8dc255bbf09d698e68d177d0c741b6
-
SHA512
a941d13895e805f98b74f6b92f1a8fc683b9eb750682d0d13364051dcc93b213ed861ed622bd288c127140a908bdc7c534d61070c91c393c60b7e77c50674c2b
-
SSDEEP
6144:SxER/vepuwFvHGMIB6tZjA5bTzrjCg/6f3dDImSL6lWQEofj4PE+LzZz9CEM:mls6IoMPn
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
10c72786e4bdb6194d2d0d9f2ca5f6d4_JaffaCakes118.xls windows office2003